Windows Analysis Report
explorando-y-jugando.msi

Overview

General Information

Sample name: explorando-y-jugando.msi
Analysis ID: 1431600
MD5: 86d01bc26931534885cf4cee900793b6
SHA1: 6d8761c82848f2bb12ca4b40aafb085c41973a6c
SHA256: 6ffcdcf6ae0006a2b218301d0eb2c275b475c897a638bbec8ef578ec7bfd8cca
Infos:

Detection

Score: 48
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Checks for available system drives (often done to infect USB drives)
Drops PE files
Found dropped PE file which has not been started or loaded
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

AV Detection

barindex
Source: explorando-y-jugando.msi Virustotal: Detection: 11% Perma Link
Source: Binary string: C:\Branch\win\Release\custact\x86\AICustAct.pdb source: explorando-y-jugando.msi, MSID93F.tmp.0.dr, MSID815.tmp.0.dr, MSID7E5.tmp.0.dr, MSID66D.tmp.0.dr, MSID805.tmp.0.dr
Source: C:\Windows\System32\msiexec.exe File opened: z: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: x: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: v: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: t: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: r: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: p: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: n: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: l: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: j: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: h: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: f: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: b: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: y: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: w: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: u: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: s: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: q: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: o: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: m: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: k: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: i: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: g: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: e: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: c: Jump to behavior
Source: C:\Windows\System32\msiexec.exe File opened: a: Jump to behavior
Source: explorando-y-jugando.msi, MSID93F.tmp.0.dr, MSID815.tmp.0.dr, MSID7E5.tmp.0.dr, MSID66D.tmp.0.dr, MSID805.tmp.0.dr String found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: explorando-y-jugando.msi, MSID93F.tmp.0.dr, MSID815.tmp.0.dr, MSID7E5.tmp.0.dr, MSID66D.tmp.0.dr, MSID805.tmp.0.dr String found in binary or memory: http://s.symcd.com06
Source: explorando-y-jugando.msi, MSID93F.tmp.0.dr, MSID815.tmp.0.dr, MSID7E5.tmp.0.dr, MSID66D.tmp.0.dr, MSID805.tmp.0.dr String found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0
Source: explorando-y-jugando.msi, MSID93F.tmp.0.dr, MSID815.tmp.0.dr, MSID7E5.tmp.0.dr, MSID66D.tmp.0.dr, MSID805.tmp.0.dr String found in binary or memory: http://t2.symcb.com0
Source: explorando-y-jugando.msi, MSID93F.tmp.0.dr, MSID815.tmp.0.dr, MSID7E5.tmp.0.dr, MSID66D.tmp.0.dr, MSID805.tmp.0.dr String found in binary or memory: http://tl.symcb.com/tl.crl0
Source: explorando-y-jugando.msi, MSID93F.tmp.0.dr, MSID815.tmp.0.dr, MSID7E5.tmp.0.dr, MSID66D.tmp.0.dr, MSID805.tmp.0.dr String found in binary or memory: http://tl.symcb.com/tl.crt0
Source: explorando-y-jugando.msi, MSID93F.tmp.0.dr, MSID815.tmp.0.dr, MSID7E5.tmp.0.dr, MSID66D.tmp.0.dr, MSID805.tmp.0.dr String found in binary or memory: http://tl.symcd.com0&
Source: explorando-y-jugando.msi, MSID93F.tmp.0.dr, MSID815.tmp.0.dr, MSID7E5.tmp.0.dr, MSID66D.tmp.0.dr, MSID805.tmp.0.dr String found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: explorando-y-jugando.msi, MSID93F.tmp.0.dr, MSID815.tmp.0.dr, MSID7E5.tmp.0.dr, MSID66D.tmp.0.dr, MSID805.tmp.0.dr String found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: explorando-y-jugando.msi, MSID93F.tmp.0.dr, MSID815.tmp.0.dr, MSID7E5.tmp.0.dr, MSID66D.tmp.0.dr, MSID805.tmp.0.dr String found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: explorando-y-jugando.msi, MSID93F.tmp.0.dr, MSID815.tmp.0.dr, MSID7E5.tmp.0.dr, MSID66D.tmp.0.dr, MSID805.tmp.0.dr String found in binary or memory: http://www.advancedinstaller.com0
Source: explorando-y-jugando.msi String found in binary or memory: http://www.inclusive.comAI_UNINSTALLERmsiexec.exeDialogBitmapdialogALLUSERS1ButtonText_Yes&S
Source: explorando-y-jugando.msi, MSID93F.tmp.0.dr, MSID815.tmp.0.dr, MSID7E5.tmp.0.dr, MSID66D.tmp.0.dr, MSID805.tmp.0.dr String found in binary or memory: https://d.symcb.com/cps0%
Source: explorando-y-jugando.msi, MSID93F.tmp.0.dr, MSID815.tmp.0.dr, MSID7E5.tmp.0.dr, MSID66D.tmp.0.dr, MSID805.tmp.0.dr String found in binary or memory: https://d.symcb.com/rpa0
Source: explorando-y-jugando.msi, MSID93F.tmp.0.dr, MSID815.tmp.0.dr, MSID7E5.tmp.0.dr, MSID66D.tmp.0.dr, MSID805.tmp.0.dr String found in binary or memory: https://d.symcb.com/rpa0.
Source: explorando-y-jugando.msi, MSID93F.tmp.0.dr, MSID815.tmp.0.dr, MSID7E5.tmp.0.dr, MSID66D.tmp.0.dr, MSID805.tmp.0.dr String found in binary or memory: https://www.thawte.com/cps0/
Source: explorando-y-jugando.msi, MSID93F.tmp.0.dr, MSID815.tmp.0.dr, MSID7E5.tmp.0.dr, MSID66D.tmp.0.dr, MSID805.tmp.0.dr String found in binary or memory: https://www.thawte.com/repository0W
Source: explorando-y-jugando.msi Binary or memory string: OriginalFilenameAICustAct.dllF vs explorando-y-jugando.msi
Source: classification engine Classification label: mal48.winMSI@4/5@0/0
Source: C:\Windows\System32\msiexec.exe File created: C:\Users\user\AppData\Local\Temp\MSID66D.tmp Jump to behavior
Source: explorando-y-jugando.msi Virustotal: Detection: 11%
Source: unknown Process created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\explorando-y-jugando.msi"
Source: unknown Process created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exe Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding A1D006493CD647BD2EC1A35C9661BDDE C
Source: C:\Windows\System32\msiexec.exe Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding A1D006493CD647BD2EC1A35C9661BDDE C Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: aclayers.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: sfc_os.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: msi.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: srpapi.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: tsappcmp.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: wkscli.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: msihnd.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: dwmapi.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: pcacli.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: oleacc.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: aclayers.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: sfc_os.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\msiexec.exe Section loaded: msi.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: aclayers.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: sfc_os.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: msi.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: samcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: logoncli.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: samcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: logoncli.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: samcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: logoncli.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: samcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: logoncli.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: samcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: logoncli.dll Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exe Section loaded: netutils.dll Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: explorando-y-jugando.msi Static file information: File size 34364416 > 1048576
Source: Binary string: C:\Branch\win\Release\custact\x86\AICustAct.pdb source: explorando-y-jugando.msi, MSID93F.tmp.0.dr, MSID815.tmp.0.dr, MSID7E5.tmp.0.dr, MSID66D.tmp.0.dr, MSID805.tmp.0.dr
Source: C:\Windows\System32\msiexec.exe File created: C:\Users\user\AppData\Local\Temp\MSID815.tmp Jump to dropped file
Source: C:\Windows\System32\msiexec.exe File created: C:\Users\user\AppData\Local\Temp\MSID66D.tmp Jump to dropped file
Source: C:\Windows\System32\msiexec.exe File created: C:\Users\user\AppData\Local\Temp\MSID805.tmp Jump to dropped file
Source: C:\Windows\System32\msiexec.exe File created: C:\Users\user\AppData\Local\Temp\MSID93F.tmp Jump to dropped file
Source: C:\Windows\System32\msiexec.exe File created: C:\Users\user\AppData\Local\Temp\MSID7E5.tmp Jump to dropped file
Source: C:\Windows\System32\msiexec.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\msiexec.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSID815.tmp Jump to dropped file
Source: C:\Windows\System32\msiexec.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSID66D.tmp Jump to dropped file
Source: C:\Windows\System32\msiexec.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSID805.tmp Jump to dropped file
Source: C:\Windows\System32\msiexec.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSID93F.tmp Jump to dropped file
Source: C:\Windows\System32\msiexec.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSID7E5.tmp Jump to dropped file
Source: C:\Windows\System32\msiexec.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Windows\System32\msiexec.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Windows\System32\msiexec.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Windows\System32\msiexec.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Windows\System32\msiexec.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Windows\System32\msiexec.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\msiexec.exe Queries volume information: C:\ VolumeInformation Jump to behavior
No contacted IP infos